mirror of https://github.com/PurpleI2P/i2pd.git
I2P: End-to-End encrypted and anonymous Internet
https://i2pd.website/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
60 lines
1.7 KiB
60 lines
1.7 KiB
#ifndef HMAC_H__ |
|
#define HMAC_H__ |
|
|
|
#include <inttypes.h> |
|
#include <string.h> |
|
#define CRYPTOPP_ENABLE_NAMESPACE_WEAK 1 |
|
#include <cryptopp/md5.h> |
|
#include "Identity.h" |
|
|
|
namespace i2p |
|
{ |
|
namespace crypto |
|
{ |
|
const uint64_t IPAD = 0x3636363636363636; |
|
const uint64_t OPAD = 0x5C5C5C5C5C5C5C5C; |
|
|
|
typedef i2p::data::Tag<32> MACKey; |
|
|
|
inline void HMACMD5Digest (uint8_t * msg, size_t len, const MACKey& key, uint8_t * digest) |
|
// key is 32 bytes |
|
// digest is 16 bytes |
|
// block size is 64 bytes |
|
{ |
|
uint64_t buf[256]; |
|
// ikeypad |
|
buf[0] = key.GetLL ()[0] ^ IPAD; |
|
buf[1] = key.GetLL ()[1] ^ IPAD; |
|
buf[2] = key.GetLL ()[2] ^ IPAD; |
|
buf[3] = key.GetLL ()[3] ^ IPAD; |
|
buf[4] = IPAD; |
|
buf[5] = IPAD; |
|
buf[6] = IPAD; |
|
buf[7] = IPAD; |
|
// concatenate with msg |
|
memcpy (buf + 8, msg, len); |
|
// calculate first hash |
|
uint8_t hash[16]; // MD5 |
|
CryptoPP::Weak1::MD5().CalculateDigest (hash, (uint8_t *)buf, len + 64); |
|
|
|
// okeypad |
|
buf[0] = key.GetLL ()[0] ^ OPAD; |
|
buf[1] = key.GetLL ()[1] ^ OPAD; |
|
buf[2] = key.GetLL ()[2] ^ OPAD; |
|
buf[3] = key.GetLL ()[3] ^ OPAD; |
|
buf[4] = OPAD; |
|
buf[5] = OPAD; |
|
buf[6] = OPAD; |
|
buf[7] = OPAD; |
|
// copy first hash after okeypad |
|
memcpy (buf + 8, hash, 16); |
|
// fill next 16 bytes with zeros (first hash size assumed 32 bytes in I2P) |
|
memset (buf + 10, 0, 16); |
|
|
|
// calculate digest |
|
CryptoPP::Weak1::MD5().CalculateDigest (digest, (uint8_t *)buf, 96); |
|
} |
|
} |
|
} |
|
|
|
#endif
|
|
|